3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo unserialize('product_name=asdfasdfasdfa+fasdf&price=55&date_order=3.9.2014&date_exp=27.9.2014&license_key=asdf&password=adsf+f&invoice_number=fdd&note=&id_product=5&edit_product=1&4eee61279e038b161bafdf677733646f=1');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/lmmL5
function name:  (null)
number of ops:  5
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'product_name%3Dasdfasdfasdfa%2Bfasdf%26price%3D55%26date_order%3D3.9.2014%26date_exp%3D27.9.2014%26license_key%3Dasdf%26password%3Dadsf%2Bf%26invoice_number%3Dfdd%26note%3D%26id_product%3D5%26edit_product%3D1%264eee61279e038b161bafdf677733646f%3D1'
          2        DO_ICALL                                         $0      
          3        ECHO                                                     $0
          4      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.24 ms | 1394 KiB | 15 Q